Stop PHI Leaks Now: A HIPAA Survival Guide

Size: px
Start display at page:

Download "Stop PHI Leaks Now: A HIPAA Survival Guide"

Transcription

1 WHITE PAPER Stop PHI Leaks Now: A HIPAA Survival Guide ZIXCORP FEBRUARY 2005 INSIDE: > PHI exposure > Recognizing PHI in > The HIPAA Security Rule > Content scanning solutions via lexicons > Lexicon development and accuracy

2 Table of Contents OVERVIEW PHI LEAKS COMMON WHAT PHI IN LOOKS LIKE POLICIES ALONE ARE NOT ENOUGH CONTENT SCANNING SOLUTIONS VIA LEXICONS LEXICON DEVELOPMENT AND ACCURACY HOW THE LEXICON IS IMPLEMENTED CONCLUSION ABOUT ZIXCORP

3 Overview is an important business tool and a slippery slope when it comes to compliance with the Health Insurance Portability and Accountability Act of 1996 (HIPAA). HIPAA requires reasonable and appropriate safeguards whenever ing Protected Health Information (PHI), but ongoing studies conducted by Zix Corporation show that healthcare organizations are still in the early stages of adopting effective methods to ensure private information is transmitted securely. The ZixCorp studies demonstrate that many healthcare organizations unknowingly expose themselves to the significant risks posed by unprotected even with privacy policies in place. But how can the healthcare community accurately keep confidential information private? ZixCorp s e-messaging protection services utilize comprehensive and accurate healthcare lexicons to help identify an organization s PHI exposure and to ensure those s are secured. This white paper illustrates what ed PHI looks like and explains how ZixCorp s proven lexicons are part of an effective secure protection program. 3

4 PHI Leaks Common As a provider of secure e-communication services, ZixCorp is profoundly interested in the nature and dynamics of within the healthcare community, between business associates, and their customers or patients. To help understand the nature of these communications, ZixCorp has developed the ZixAuditor assessment service that provides a characterization of an organization s traffic and PHI content. Using this service over the past two years, the streams of hundreds of healthcare organizations have been analyzed to assess the level of PHI exposure and the risk to patient privacy. ZixCorp sustains an ongoing study of sampled from healthcare organizations. These samples represent the inbound and outbound traffic for a period of three to seven days for each of the organizations that commission assessments. The messages are filtered through ZixCorp s healthcare lexicon which identifies PHI, manually sampled for accuracy, and classified as containing sensitive PHI or not. Only those messages containing PHI are considered a risk to the organization and patient privacy. Between April and December 2004, ZixCorp sampled over eight million s sent from or received by 73 healthcare organizations including health insurance plans, hospitals, physician practices, intermediaries, and other healthcare-related organizations. None of the organizations examined had secure e-messaging solutions in place. All the organizations examined during this time period had unsecured PHI in their . It s not surprising that organizations have this kind of exposure given the universality of and the convenience it supplies in day-to-day operations. But the messages pose potential liability risks and are not in compliance with HIPAA s Security Rule. For each of the organizations studied, the average 10,000 messages per day exposure rate in outbound flow was approximately 2%. Though the number may seem low, here s the x 2% exposure rate reality: a small- to medium-sized healthcare organization = 50,000 occurrences might send 5,000 messages out of the organization per of unsecured PHI per year. week. At the average 2% exposure rate, that s 100 occurrences of unsecured PHI leaving the organization each week. That s 5,000 occurrences per year. Large organizations can send over 10,000 messages per day. At the 2% average exposure rate, that s approximately 50,000 occurrences of unsecured PHI leaving the organization per year. 4

5 What PHI in Looks Like What does this PHI look like? Manual examination of messages identified as containing PHI reveals that most are not malicious efforts to expose confidential information. The bulk of these messages are between organizations using the channel in the daily course of business. Most of the messages are administrative or clerical in nature, clarifying patient records and fixing billing issues. They re conversations between providers and payors discussing individual claims, correcting coding issues, clarifying dates, etc. Some of the messages deal with patient treatment; for example, providers communicating with each other about a referral, consulting on a diagnosis, or a shared patient. Additionally, some messages are direct communications between patients and care providers. Patients communicate with care providers via (and vice versa) asking questions, clarifying medications, managing their disease, scheduling appointments, and other things of this nature. Below are some examples of messages containing PHI. EXAMPLE #1 From: [email protected] To: [email protected] Subject: Shared patient Here s the info you requested on patient Jane Doe, ss# She began tamoxifen approximately 5/15/2002. No sign of cancer. Example #1 is clear, concise and easily fits HIPAA s definition of PHI. It contains a patient's Social Security Number, medication, and diagnosis discussion. 5

6 EXAMPLE #2 From: To: Subject: Where is this? Hello, could you chk on this claim, mem num for , dates of svc from through Sent appeal on 0806 with prime pymt, did you receive, is this in process? Example #2 is more common to what is seen in containing PHI. It is cryptic, full of strange abbreviations, sentence fragments and misspellings. Building tools that scan for PHI in can be challenging because of these kinds of messages. It speaks to the nature of as a communication method. It s free, open text. Some readers may argue that this example is not PHI because it does not list the patient s name. But HIPAA s definition of PHI is general and includes any information that identifies the individual or if there is reasonable basis to believe the information can be used to identify the individual. Certainly, in many information systems, a member number, patient ID or other such account number is more individually identifying than a person s name. There may be multiple patients with the same name, but they each have a unique ID in the health information system. 6

7 EXAMPLE #3 Sample Attachment P a t i e n t N a m e : J a n e D o e A d m i t t e d : 1 / 1 / 0 5 Therapist: J. Smith LMFT DSM-IV AXIS I 311 Depressive Disorder NOS Polysubstance Dependence Oppositional Defiant Disorder, Anxiety Disorder NOS T R E A T M E N T I S S U E S : J a n e D o e was admitted to the program with complaints by parents of several symptoms. Reports included self-harming behavior (in the form of substance abuse and cutting). [This specific report continued for several pages in detail ] Example #3 shows an excerpt from an attachment. In this case, it is a document that contains a patient s medical history being shared between two therapists. It includes the DSM-IV classifications relevant to the case and a very detailed history that extended over several pages. Because it relates to a patient s mental health, it is especially sensitive. 7

8 EXAMPLE #4 Sample Attachment GRP# SSN LAST NAME FIRST SRV DATE ACCT BALANCE AALTO T 00/00/00 $ ABARE B 00/00/00 $ ABARE D 00/00/00 $4, ABARE W 00/00/00 $1, ABDELHAMED A 00/00/00 $ ABDELHAMED A 00/00/00 $ ABDELHAMED E 00/00/00 $7, ABDELHAMED E 00/00/00 $7, ABDELHAMED Z 00/00/00 $ ABDELHAMED Z 00/00/00 $ ABRAHAMSON P 00/00/00 $15, ABRAHAMSON P 00/00/00 $ ABRAHAMSON R 00/00/00 $ ABRAHAMSON R 00/00/00 $25, ABRAMS A 00/00/00 $14, ABRAMS C 00/00/00 $ ABRAMS J 00/00/00 $ ABRAMS L 00/00/00 $2, ABRAMS M 00/00/00 $23, ABRAMS S 00/00/00 $5, ABUAN E 00/00/00 $41, ABUAN M 00/00/00 $2, ABUAN S 00/00/00 $1, [This specific attachment continued for hundreds of rows ] Example #4 shows what is all too common in the examined by ZixCorp. It s the kind of message that makes privacy officers cringe. This is another excerpt from an attachment. In this case, it s a spreadsheet that lists patient Social Security numbers, names, dates of service, and account balances. Messages with attachments like this are data files of patient accounts usually being shared between providers and business associates responsible for collections or claim processing. They are particularly sensitive because a single message could contain the private information of potentially thousands of individuals. This is a good example of how a single instance of exposure can cause enormous liability for the organization and pose great risk to patient privacy. 8

9 All these examples are from conversations taking place between covered entities, meaning that the disclosures are permitted under the HIPAA Privacy Rule. However, because these messages were sent via across the Internet (an inherently insecure method of transmission), the messages do not meet the HIPAA Security Rule requirements specifying the need to encrypt PHI when sending across a public network. WHAT IS THE SECURITY RULE? In brief, the goal of the HIPAA Security Rule is to protect the confidentiality, integrity and availability of electronic PHI. Each security requirement in the rule can be categorized into one of three groups: Administrative safeguards Physical safeguards Technical safeguards It is in the last category where securing resides. To view the full Security Rule, visit Policies Alone Are Not Enough This is the heart of the issue: most healthcare organizations send unsecured PHI in their , even when they have administrative policies in place requiring users to not send PHI via . Administrative policies alone simply fall short of protecting PHI. The ZixCorp studies demonstrate this. A combined approach that includes both policies and technical safeguards is simply more effective. With the deadline for HIPAA Security Rule compliance looming in April, obviously a disconnect exists between what HIPAA requires and the fact that most organizations are sending unsecured PHI in their . What are some of the implications of this continued behavior? 1. Organizations may not recognize that there is a legal requirement to provide protections for PHI in . It s easy to overlook because it s not an official business process, although clearly it s being used as such. 2. Some organizations have administrative policies in place and adequate technology, but they are not working together to form an effective solution. 9

10 3. Some organizations have underestimated the importance of user awareness and training. Even the best policies and technology will fail if no one knows how or when to use them. Administrative policies can fail because they alone are not sufficient to protect PHI in today s ubiquitous environment. But technical solutions are not sufficient either. Technical systems that end users misunderstand, misuse, or ignore also will fail. Systems and policies cannot work in isolation. They must be combined and used in conjunction with appropriate procedures, user training, and ongoing risk assessment. A successful union of encryption technology, user training, and administrative policies enables organizations to most effectively meet the regulatory compliance, safeguard themselves, and avoid the risk of exposing PHI. Doing so can secure the channel, ensuring that it remains a viable asset to the organization and not a liability sinkhole. Content Scanning Solutions via Lexicons A lexicon is a file consisting of a comprehensive set of terms, phrases, expressions, and numeric pattern masks that identify sensitive types of information. ZixCorp has developed lexicons specifically for healthcare organizations to automatically detect and encrypt messages like those shown above. ZixCorp uses many sources to generate the healthcare lexicon content that searches for sensitive PHI data, including federal regulations, authoritative reference sources, and standard of care practices. ZixCorp s content scanners can examine all message subjects, bodies, and attachments for expressions defined within the lexicons. Lexicon Development and Accuracy ZixCorp goes to great lengths to ensure that the healthcare lexicons are accurate and precise. This is accomplished through comprehensive definition and design, coupled with exhaustive manual analysis to ensure that the lexicon results agree with the judgment of the designers. The following is an overview of the design process and validation of the healthcare lexicons: 1. ZixCorp consulted with expert legal counsel in regulatory compliance at Preston-Gates-Ellis, LLP. 2. Lexicons were designed based on the definition of PHI from HIPAA regulations. 10

11 3. Tens of thousands of message samples are gathered from payors and providers. 4. The message samples are manually examined and classified. 5. Reference sources were identified and used to ensure comprehensive content. These sources included: National Library of Medicine s Medical Subject Headings (MeSH) for human diseases and diagnoses American Medical Association s Current Procedural Terminology (CPT) Center for Disease Control s International Classification of Diseases v.9 (ICD-9) Medicare s Health Care Procedural Coding System (HCPCS) American Insurance Association of America glossary 6. The lexicons were constructed from the terminology lists and run against sample messages. 7. The lexicons results are compared to the results of the manual classifications. 8. Lexicons are tuned against the samples, then measured against separate samples to ensure excellent real-world accuracy performance. 9. Ongoing revisions are made based on ZixAuditor analyses and customer input. With each new release, the accuracy of the healthcare lexicons has improved, minimizing the occurrence of false hits and maximizing the liability coverage. The end result is a precise, accurate, and comprehensive content scanner that can correctly identify PHI in . How the Lexicon is Implemented The healthcare lexicons are an integral part of ZixAuditor assessment and ZixVPM (Virtual Private Messenger) encryption services. The lexicons ensure that PHI is detected and encrypted for all throughout an organization. ZixAuditor is a comprehensive service that enables organizations to identify vulnerabilities, implement more effective policies and procedures, and monitor ongoing communications to determine compliance and effectiveness. The healthcare lexicon detects PHI in both incoming and outgoing messages for a total picture of the effectiveness of current procedures. ZixVPM is a server-based enterprise encryption solution that provides a secure e-messaging gateway without the need to create, deploy, or manage end-user encryption keys and software. The healthcare lexicons eliminate human guesswork and enforce existing company security policies for total protection. 11

12 Conclusion is a high-volume channel, so even a small percentage of unsecured PHI can quickly mount to a large risk. While it may be possible to send an occasional unsecured in response to specific circumstances without much risk, any routine or reasonable highvolume use of will create serious risks to organizational liability and patient privacy. The greater the volume of , the higher the risk, and the more evidence is available against the organization in case of a penalty action. ZixCorp s e-messaging protection services offer everything a company needs to detect PHI in and secure it in accordance with the HIPAA Privacy and Security Rules. Only ZixCorp offers a comprehensive suite of services to ensure compliance: an assessment service, built-in healthcare lexicons to detect PHI, and a user awareness program to ensure that employees and recipients understand company policy. For more information on ZixCorp services, call toll-free or visit About ZixCorp ZixCorp provides easy-to-use-and-deploy e-communication services that protect, manage, and deliver sensitive HIPAA information. Hundreds of healthcare organizations use ZixVPM, a corporate-wide encryption service that automatically encrypts messages containing PHI. Other services include content filtering, e-prescribing and e-lab services for improved office efficiency. ZixCorp e-messaging protection services include: ZixVPM (Virtual Private Messenger) is a system-wide solution for organizations that require a high level of protection for communications. It seamlessly integrates into existing network infrastructure, solves the need for security, and enables companies to set their e-messaging policies for the entire enterprise, departments, or individuals. ZixAuditor is a non-intrusive analysis service that enables organizations to identify security vulnerabilities, monitor ongoing communications to determine compliance, and implement more effective policies if needed. ZixAuditor provides strategic insight into use to help companies better understand usage patterns. ZixPort is a Web-based secure e-messaging portal that provides enterprises with private, secure, and branded communication capabilities while minimizing the impact to existing IT, Web, or security infrastructures. ZixMail is a desktop encryption program that provides point-to-point secure delivery. It s an easy-to-use manual solution that enables users to encrypt, decrypt, and send private s and attachments to anyone. 12

13 2711 N. Haskell Ave. Suite 2300, LB 36 Dallas, TX All rights reserved. Zix Corporation cannot be responsible for errors in typography. All company, brand and product names are trademarks and/or registered trademarks of their respective owners. PHIWP205

Stop PHI Leaks: A Guide to the Importance of Email Encryption and HIPAA

Stop PHI Leaks: A Guide to the Importance of Email Encryption and HIPAA Stop PHI Leaks: A Guide to the Importance of Email Encryption and HIPAA INSIDE: > PHI exposure > Recognizing PHI in email > Tougher HIPAA enforcement > Content filter development and accuracy A Whitepaper

More information

ZixCorp Lexicons. An Overview

ZixCorp Lexicons. An Overview ZixCorp Lexicons An Overview March 2013 Table of Contents Introduction.. Pg. 3 Healthcare Lexicons.. Pg. 3 Example #1: (Standard rule covering official business messages).... Pg. 4 Example #2: (Standard

More information

Email Encryption Services

Email Encryption Services Services ZixCorp provides easy-to-use email encryption services for privacy and regulatory compliance. As the largest email encryption services provider, ZixCorp protects tens of millions of members in

More information

Email Encryption Services

Email Encryption Services Services ZixCorp provides easy-to-use email encryption services for privacy and regulatory compliance. As the largest email encryption services provider, ZixCorp protects tens of millions of members in

More information

A NATURAL FIT. Microsoft Office 365 TM and Zix TM Email Encryption. By ZixCorp www.zixcorp.com

A NATURAL FIT. Microsoft Office 365 TM and Zix TM Email Encryption. By ZixCorp www.zixcorp.com Microsoft Office 365 TM and Zix TM Email Encryption A NATURAL FIT By ZixCorp www.zixcorp.com Microsoft Office 365 TM and Zix TM Email Encryption Page 1 INTRODUCTION IT managers and decision makers are

More information

Managing PHI in the Cloud Best Practices

Managing PHI in the Cloud Best Practices Managing PHI in the Cloud Best Practices Executive Whitepaper Recent advances in both Cloud services and Data Loss Prevention (DLP) technology have substantially improved the ability of healthcare organizations

More information

How To Use Zixselect In Outlook 2003

How To Use Zixselect In Outlook 2003 for Outlook 2003 Version 3.5 Copyright and Trademarks Notice The contents of this manual, the associated ZixVPM software and other computer programs offered by Zix Corporation (hereinafter collectively

More information

Best Practices for DLP Implementation in Healthcare Organizations

Best Practices for DLP Implementation in Healthcare Organizations Best Practices for DLP Implementation in Healthcare Organizations Healthcare organizations should follow 4 key stages when deploying data loss prevention solutions: 1) Understand Regulations and Technology

More information

The Value of Email DLP

The Value of Email DLP The Value of Email DLP Identifying and Minimizing Your Organization s Greatest Risk By ZixCorp www.zixcorp.com Zix Email Data Loss Prevention Page 1 CLICKING SEND IS ALMOST TOO EASY. We ve all had those

More information

A New Standard in Encrypted Email. A discussion on push, pull and transparent delivery

A New Standard in Encrypted Email. A discussion on push, pull and transparent delivery A New Standard in Encrypted Email A discussion on push, pull and transparent delivery By ZixCorp November 2010 2 Email enhances our daily business life. It enables efficient, real-time communication, unites

More information

ZixCorp. The Market Leader in Email Encryption Services. Adam Lipkowitz ZixCorp (781) 993-6102 [email protected]

ZixCorp. The Market Leader in Email Encryption Services. Adam Lipkowitz ZixCorp (781) 993-6102 alipkowitz@zixcorp.com ZixCorp The Market Leader in Email Encryption Services Adam Lipkowitz ZixCorp (781) 993-6102 [email protected] Agenda: Discussion 1. Alternatives When Sending Sensitive Information 2. Business Justification

More information

The Impact of HIPAA and HITECH

The Impact of HIPAA and HITECH The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients

More information

Sendmail and PostX: Simplifying HIPAA Email Compliance. Providing healthcare organizations with secure outbound, inbound and internal email

Sendmail and PostX: Simplifying HIPAA Email Compliance. Providing healthcare organizations with secure outbound, inbound and internal email Sendmail and PostX: Simplifying HIPAA Email Compliance Providing healthcare organizations with secure outbound, inbound and internal email October 5, 2005 About Your Hosts Sendmail Complete email security

More information

Data Loss Prevention and HIPAA. Kit Robinson Director [email protected]

Data Loss Prevention and HIPAA. Kit Robinson Director kit.robinson@vontu.com Data Loss Prevention and HIPAA Kit Robinson Director [email protected] ID Theft Tops FTC's List of Complaints For the 5 th straight year, identity theft ranked 1 st of all fraud complaints. 10 million

More information

FedPayments Reporter Encrypted Email Delivery Overview

FedPayments Reporter Encrypted Email Delivery Overview FedPayments Reporter Encrypted Email Delivery Overview Revised 8/7/2015 The FedPayments Reporter Service offers an automated, encrypted email report delivery feature. This report delivery feature is integrated

More information

Anthem Workers Compensation

Anthem Workers Compensation Anthem Workers Compensation ICD-10 Frequently Asked Questions What is ICD-10? International Classification of Diseases, 10th Revision (ICD-10) is a diagnostic and procedure coding system endorsed by the

More information

HOW EMAIL ENCRYPTION STRENGTHENS SECURITY. www.zixcorp.com THE LEADER IN EMAIL ENCRYPTION

HOW EMAIL ENCRYPTION STRENGTHENS SECURITY. www.zixcorp.com THE LEADER IN EMAIL ENCRYPTION HOW EMAIL ENCRYPTION STRENGTHENS SECURITY www.zixcorp.com THE LEADER IN EMAIL ENCRYPTION THE SECURITY YOU NEED NOW Whether you are a HIPAA-covered entity or business associate, the changes to HIPAA through

More information

what your business needs to do about the new HIPAA rules

what your business needs to do about the new HIPAA rules what your business needs to do about the new HIPAA rules Whether you are an employer that provides health insurance for your employees, a business in the growing health care industry, or a hospital or

More information

White Paper. From Policy to Practice: A Practical Guide to Implementing HIPAA Security Safeguards

White Paper. From Policy to Practice: A Practical Guide to Implementing HIPAA Security Safeguards From Policy to Practice: A Practical Guide to Implementing HIPAA Security Safeguards Abstract HIPAA requires a number of administrative, technical, and physical safeguards to protect patient information

More information

Practices for Managing Information Protection & Storage

Practices for Managing Information Protection & Storage HIPAA Compliance and Best Practices for Managing Information Protection & Storage Wednesday, March 31, 2010 Sponsored by: Moderator Bernie Monegain Editor Healthcare IT News Guest Speakers Shawna Ridley,

More information

Protecting Regulated Information in Cloud Storage with DLP

Protecting Regulated Information in Cloud Storage with DLP Protecting Regulated Information in Cloud Storage with DLP Protection of Regulated Information in cloud storage can be provided by an appropriate Data Loss Prevention, DLP, solution. The steps involved

More information

Blue Shield Mental Health Service Administrator (MHSA) Quality Improvement Program

Blue Shield Mental Health Service Administrator (MHSA) Quality Improvement Program Blue Shield Mental Health Service Administrator (MHSA) Quality Improvement Program Blue Shield of California s mental health service administrator (MHSA) administers behavioral health and substance use

More information

Outbound Email Security and Content Compliance in Today s Enterprise, 2005

Outbound Email Security and Content Compliance in Today s Enterprise, 2005 Outbound Email Security and Content Compliance in Today s Enterprise, 2005 Results from a survey by Proofpoint, Inc. fielded by Forrester Consulting on outbound email content issues, May 2005 Proofpoint,

More information

HIPAA Administrative Simplification and Privacy (AS&P) Frequently Asked Questions

HIPAA Administrative Simplification and Privacy (AS&P) Frequently Asked Questions HIPAA Administrative Simplification and Privacy (AS&P) Frequently Asked Questions ELECTRONIC TRANSACTIONS AND CODE SETS The following frequently asked questions and answers were developed to communicate

More information

HIPAA Privacy Policies

HIPAA Privacy Policies HIPAA Privacy Policies Healthcare Insurance Portability and Accountability Act of 1996 (HIPAA) The HIPAA Privacy Rule created a national standard to protect patient s medical records and other personal

More information

Health Insurance Portability and Accountability Act (HIPAA)

Health Insurance Portability and Accountability Act (HIPAA) Health Insurance Portability and Accountability Act (HIPAA) General Education Presented by: Bureau of Personnel Department of Health Department of Human Services Department of Social Services Bureau of

More information

Email Compliance in 5 Steps

Email Compliance in 5 Steps Email Compliance in 5 Steps Introduction For most businesses, email is a vital communication resource. Used to perform essential business functions, many organizations rely on email to send sensitive confidential

More information

Best Practices for Choosing a Content Control Solution

Best Practices for Choosing a Content Control Solution Best Practices for Choosing a Content Control Solution March 2006 Copyright 2006 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other

More information

EXCEL PHYSICAL THERAPY, INC.

EXCEL PHYSICAL THERAPY, INC. EXCEL PHYSICAL THERAPY, INC. Medical History Form Name: Date of Birth: Date: Are you employed? YES NO Right Handed Left Handed If NO, last day worked? Do you smoke? YES NO #of packs/day Occupation: Height:

More information

JEWISH FAMILY SERVICE NOTICE OF PRIVACY PRACTICES

JEWISH FAMILY SERVICE NOTICE OF PRIVACY PRACTICES Jewish Family Service takes pride in treating our clients and each other with respect and dignity. Protecting your health information is very important to us. We want you to have a clear understanding

More information

Health Insurance Portability and Accountability Act HIPAA. Glossary of Common Terms

Health Insurance Portability and Accountability Act HIPAA. Glossary of Common Terms Health Insurance Portability and Accountability Act HIPAA Glossary of Common Terms Terms: HIPAA Definition*: PHCS Definition/Interpretation: Administrative Simplification HIPAA Subtitle F It is the purpose

More information

NOTICE OF HEALTH INFORMATION PRIVACY PRACTICES (HIPAA)

NOTICE OF HEALTH INFORMATION PRIVACY PRACTICES (HIPAA) NOTICE OF HEALTH INFORMATION PRIVACY PRACTICES (HIPAA) THIS NOTICE OF PRIVACY PRACTICES DESCRIBES HOW HEALTH INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION.

More information

Cisco SAFE: A Security Reference Architecture

Cisco SAFE: A Security Reference Architecture Cisco SAFE: A Security Reference Architecture The Changing Network and Security Landscape The past several years have seen tremendous changes in the network, both in the kinds of devices being deployed

More information

Tumbleweed MailGate Secure Messenger

Tumbleweed MailGate Secure Messenger EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT Tumbleweed MailGate Secure Messenger JANUARY 2007 www.westcoastlabs.org 2 EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT CONTENTS MailGate Secure Messenger Tumbleweed

More information

HIPAA DATA SECURITY & PRIVACY COMPLIANCE

HIPAA DATA SECURITY & PRIVACY COMPLIANCE HIPAA DATA SECURITY & PRIVACY COMPLIANCE This paper explores how isheriff Cloud Security enables organizations to meet HIPAA compliance requirements with technology and real-time data identification. Learn

More information

HIPAA: AN OVERVIEW September 2013

HIPAA: AN OVERVIEW September 2013 HIPAA: AN OVERVIEW September 2013 Introduction The Health Insurance Portability and Accountability Act of 1996, known as HIPAA, was enacted on August 21, 1996. The overall goal was to simplify and streamline

More information

Strategies for Electronic Exchange of Substance Abuse Treatment Records

Strategies for Electronic Exchange of Substance Abuse Treatment Records Strategies for Electronic Exchange of Substance Abuse Treatment Records Patricia Gray, J. D., LL. M. Prepared for the Texas Health and Human Services Commission and the Texas Health Services Authority

More information

Notice of Privacy Practices

Notice of Privacy Practices SHANNON LERACH, Ph.D. Licensed Clinical Psychologist PSY23705 243 N. Highway 101, Suite 16, Solana Beach, CA 92075 Telephone: (619) 817.5320 Fax: (858) 481.1674 Notice of Privacy Practices This Notice

More information

White Paper. Document Security and Compliance. April 2013. Enterprise Challenges and Opportunities. Comments or Questions?

White Paper. Document Security and Compliance. April 2013. Enterprise Challenges and Opportunities. Comments or Questions? White Paper April 2013 Document Security and Compliance Enterprise Challenges and Opportunities Comments or Questions? Table of Contents Introduction... 3 Prevalence of Document-Related Security Breaches...

More information

IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview

IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview IBM Internet Security Systems The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview Health Insurance Portability and Accountability Act

More information

Direct Secure Messaging: Improving the Secure and Interoperable Exchange of Health Information

Direct Secure Messaging: Improving the Secure and Interoperable Exchange of Health Information Direct Secure Messaging: Improving the Secure and Interoperable Exchange of Health Information Within the healthcare industry, the exchange of protected health information (PHI) is governed by regulations

More information

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant 1 HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant Introduction U.S. healthcare laws intended to protect patient information (Protected Health Information or PHI) and the myriad

More information

Get EnABELed with ABELMed

Get EnABELed with ABELMed Get EnABELed with ABELMed Electronic Health Record and Practice Management Solutions We focus on your Practice... So you can focus on your Patients Start reaping benefits of ABELMed EHR from day one: Eliminate

More information

Deploying DLP and Encryption

Deploying DLP and Encryption case study Deploying DLP and Encryption in Financial, Government, Healthcare, and Insurance Verticals Proven DLP Results in the Banking Industry 1 A company with two hundred distributed offices which offers

More information

Email Security Solutions

Email Security Solutions TECHNOLOGY REPORT Email Security Solutions 1 TECHNOLOGY REPORT SUPPLEMENT EMAIL SECURITY TECHNOLOGY REPORT IF YOUR EMAIL IS SO CRITICAL, CAN YOU BE SURE IT S REALLY REALLY PRIVATE? FIND THE FULL RESULTS

More information

To precertify inpatient admissions or transitional care services, call 1-866-688-3400 and select option #1.

To precertify inpatient admissions or transitional care services, call 1-866-688-3400 and select option #1. Security Health Plan provides coverage of various mental health/aoda (alcohol and other drug abuse) benefits to individual and employer group members. These benefits are managed by Security Health Plan.

More information

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment 4547 The Case For HIPAA Risk Assessment Leader s Guide IMPORTANT INFORMATION FOR EDUCATION COORDINATORS & PROGRAM FACILITATORS PLEASE NOTE: In order for this program to meet Florida course requirements,

More information

Health Information Technology Courses

Health Information Technology Courses Health Information Technology Courses Course ID Course Title Credits HIT-100 Introduction to Healthcare 3 HIT-110 Medical Terminology I 3 HIT-120 Medical Terminology II 3 HIT-130 Medical Transcription/Editing

More information

Titus and Cisco IronPort Integration Guide Improving Outbound and Inbound Email Security. Titus White Paper

Titus and Cisco IronPort Integration Guide Improving Outbound and Inbound Email Security. Titus White Paper Titus and Cisco IronPort Integration Guide Improving Outbound and Inbound Email Security Titus White Paper Information in this document is subject to change without notice. Complying with all applicable

More information

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES HIPAA COMPLIANCE Achieving HIPAA Compliance with Security Professional Services The Health Insurance

More information

What Virginia s Free Clinics Need to Know About HIPAA and HITECH

What Virginia s Free Clinics Need to Know About HIPAA and HITECH What Virginia s Free Clinics Need to Know About HIPAA and HITECH This document is one in a series of tools and white papers produced by the Virginia Health Care Foundation to help Virginia s free clinics

More information

Why Email Encryption is Essential to the Safety of Your Business

Why Email Encryption is Essential to the Safety of Your Business Why Email Encryption is Essential to the Safety of Your Business What We ll Cover Email is Like a Postcard o The Cost of Unsecured Email 5 Steps to Implement Email Encryption o Know Your Compliance Regulations

More information

Donna S. Sheperis, PhD, LPC, NCC, CCMHC, ACS Sue Sadik, PhD, LPC, NCC, BC-HSP Carl Sheperis, PhD, LPC, NCC, MAC, ACS

Donna S. Sheperis, PhD, LPC, NCC, CCMHC, ACS Sue Sadik, PhD, LPC, NCC, BC-HSP Carl Sheperis, PhD, LPC, NCC, MAC, ACS Donna S. Sheperis, PhD, LPC, NCC, CCMHC, ACS Sue Sadik, PhD, LPC, NCC, BC-HSP Carl Sheperis, PhD, LPC, NCC, MAC, ACS 1 DISCLAIMER Please review your own documentation with your attorney. This information

More information

Shellie Sulzberger, LPN, CPC, ICDCT-CM Coding & Compliance Initiatives, Inc.

Shellie Sulzberger, LPN, CPC, ICDCT-CM Coding & Compliance Initiatives, Inc. Shellie Sulzberger, LPN, CPC, ICDCT-CM Coding & Compliance Initiatives, Inc. Reasonable efforts have been made to provide the most accurate and current information on CPT 2015 code changes. However codes,

More information

INSTANT MESSAGING SECURITY

INSTANT MESSAGING SECURITY INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part

More information

Somansa Data Security and Regulatory Compliance for Healthcare

Somansa Data Security and Regulatory Compliance for Healthcare Somansa White Paper Somansa Data Security and Regulatory Compliance for Healthcare How Somansa can protect ephi- electronic patient health information and meet the requirements for healthcare compliances,

More information

The following online training module will provide a general overview of the Vanderbilt University Medical Center s (VUMC) technical revenue cycle.

The following online training module will provide a general overview of the Vanderbilt University Medical Center s (VUMC) technical revenue cycle. The following online training module will provide a general overview of the Vanderbilt University Medical Center s (VUMC) technical revenue cycle. This Revenue Cycle Overview training will establish a

More information

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services 1 Contents 3 Introduction 5 The HIPAA Security Rule 7 HIPAA Compliance & AcclaimVault Backup 8 AcclaimVault Security and

More information

Understanding the HIPAA standard transactions: The HIPAA Transactions and Code Set rule

Understanding the HIPAA standard transactions: The HIPAA Transactions and Code Set rule Understanding the HIPAA standard transactions: The HIPAA Transactions and Code Set rule Many physician practices recognize the Health Information Portability and Accountability Act (HIPAA) as both a patient

More information

HIPAA The Law Explained. Click here to view the HIPAA information.

HIPAA The Law Explained. Click here to view the HIPAA information. HIPAA The Law Explained Click here to view the HIPAA information. HIPAA - Provisions 5 Major Provisions/Titles Title 1 Title 2 Title 3 Title 4 Title 5 More Information on Administrative Simplification

More information

Metropolitan Living, LLC 151 W. Burnsville Parkway, Suite 101 Burnsville, MN 55337 Ph: (952) 564-3030 Fax: (651) 925-0031

Metropolitan Living, LLC 151 W. Burnsville Parkway, Suite 101 Burnsville, MN 55337 Ph: (952) 564-3030 Fax: (651) 925-0031 The Health Insurance Portability and Accountability Act (HIPAA) and Client Privacy Statement This notice describes how your medical information may be used and disclosed and how you can get access to this

More information

Have you ever accessed

Have you ever accessed HIPAA and Your Mobile Devices Not taking the appropriate precautions can be very costly. 99 BY MARK TERRY Alexey Poprotskiy Dreamstime.com Have you ever accessed patient data offsite using a laptop computer,

More information

HIPAA and Mental Health Privacy:

HIPAA and Mental Health Privacy: HIPAA and Mental Health Privacy: What Social Workers Need to Know Presenter: Sherri Morgan, JD, MSW Associate Counsel, NASW Legal Defense Fund and Office of Ethics & Professional Review 2010 National Association

More information

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA

More information

HIPAA. Health Insurance Portability & Accountability Act Administrative Simplification FIVE THINGS YOU SHOULD KNOW ABOUT PAYMENTS AND HIPAA

HIPAA. Health Insurance Portability & Accountability Act Administrative Simplification FIVE THINGS YOU SHOULD KNOW ABOUT PAYMENTS AND HIPAA HIPAA Health Insurance Portability & Accountability Act Administrative Simplification FIVE THINGS YOU SHOULD KNOW ABOUT PAYMENTS AND HIPAA Steve Stone PNC Bank, N.A. October 14, 2009 Five Things You Should

More information

Physician Champions David C. Kibbe, MD, & Daniel Mongiardo, MD FAQ Responses

Physician Champions David C. Kibbe, MD, & Daniel Mongiardo, MD FAQ Responses Physician Champions David C. Kibbe, MD, & Daniel Mongiardo, MD FAQ Responses DR. KIBBE S RESPONSES What is health information exchange? How can health information exchange help my practice? Can I comply

More information

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security

More information

HIPAA Omnibus Compliance How A Data Loss Prevention Solution Can Help

HIPAA Omnibus Compliance How A Data Loss Prevention Solution Can Help HIPAA Omnibus Compliance How A Data Loss Prevention Solution Can Help The Health Information Portability and Accountability Act (HIPAA) Omnibus Rule which will begin to be enforced September 23, 2013,

More information

How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization

How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization Alertsec offers Cloud Managed - Policy Controlled - Security Modules for Ensuring Compliance at the Endpoints Contents

More information